# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9efb5a2553b16c309a795e9759847bf9dfe2ecb7ccccd44c58ccc00bb6181454
Pseudo Output
d2e0e5d2d175572926b651886bbf8a2a5cd5fadb7d5eb2de940789da41c80b22
Key Image
9490c8f7f93de9673b02918f0d1555e8fdccfb7a75bf3268d16bcd0ea654e517
Pseudo Output
542d4fb8245d12d6de998f3a7d8608d1acd34a763ad4d63b6f06a58da18eb156
Key Image
8c2f07d2299359ba70edd4b699b6a04d3c5479d96a04a16b01949b3eb7642a03
Pseudo Output
a679f067cf153c70e547947b2079c9e4e149540aa7091b0f0ab652ab9078d91b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a8a65b4baf6a55dbfe85028225ee613ac7a064c2d18d068b6e982052edce4932
Commitment
c4a5e5ddf24ba8259c16cf241cc6e7d598daae8874c6443d27a1938a5ace143e
Range Proof
672 bytes (Bulletproof)
Memo
1ef4fb1de5a8165ab9e5acf7294826ae63b2061d70c69c8c6810bcc07e6dfd924c7933cafa2ad7052c41a693b18a9ecbea174dc29aee2385d9c261d7c6cd934e6be017f4a9897c87c3b6f1ff930a1695ab975b1e04f9cb7cbe6dcc216e63d14f6600de043a5bcf6764de93fe62793f67101a1413b3c98e28935f98497be798c3 (encrypted)
Stealth Address
1a64a249db3d294cdcfa22960b10867fa946db1e82cf8cd327c4ecf7c783b46f
Commitment
2a3ff89df0fd52d62327da860463384f7eb2c1e6b695a464b0ea8761bdc20734
Range Proof
672 bytes (Bulletproof)
Memo
59cf646ea620307740f4985051640a41e634a5e289d8926a893f05d83b641e22fca5ea2388935746d9faf2e461cdf780945b70f648f1ca4792bced72578a03bed03a4da0fb4d53ad4f05b36998932ae7ab2bc04c4421f4e876460bf56a85500a16306f9388c3ab7ae8fde11c4cdd3ca85dbef1a92756de8d79f59f17e13f7756 (encrypted)